You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This authoritative, all-in-one introduction, manual, and complete reference shows readers - at all levels of technical expertise - how to use Kermit to transfer diverse data between different computer systems and data communications environments. Using tutorials, case studies, and examples of actual Kermit codes, it provides instructions for basic use and a detailed description of the Kermit protocols: * File management through protocols * Command referencing and extended features * Telecommunications protocols
Written by the co-managers of the Kermit Project, this is a revised and updated tutorial on data communications, with new material on today's high-speed modems and how to make the best use of them
In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB. When Cliff Stoll followed the trail of a 75-cent accounting error at his workplace, the Lawrence Berkeley National Laboratory, it led him to the presence of an unauthorized user on the system. Suddenly, Stoll found himself crossing paths with a hacker named “Hunter” who had managed to break into sensitive United States networks and steal vital information. Stoll made the dangerous decision to begin a one-man hunt of his own: spying on the spy. It was a high-stakes game of deception, broken codes, satellites, and missile bases, one that eventually gained the attention of the CIA. What started as simply observing soon became a game of cat and mouse that ultimately reached all the way to the KGB.
This book investigates the sustained engagement between American literature and sound recording technologies during the twentieth century.
If you have ever looked at a fantastic adventure or science fiction movie, or an amazingly complex and rich computer game, or a TV commercial where cars or gas pumps or biscuits behaved liked people and wondered, “How do they do that?”, then you’ve experienced the magic of 3D worlds generated by a computer. 3D in computers began as a way to represent automotive designs and illustrate the construction of molecules. 3D graphics use evolved to visualizations of simulated data and artistic representations of imaginary worlds. In order to overcome the processing limitations of the computer, graphics had to exploit the characteristics of the eye and brain, and develop visual tricks to simula...
Dive into the electrifying tale of a Brooklyn-born patriot turned radical activist, in an era when America was torn by its ideological extremes. In the shadow of recent turmoil, Join the Conspiracy transports readers to a pivotal moment of division and dissent in American history: the late 1960s. Against the backdrop of the Vietnam War and a nation grappling with internal conflict, this compelling narrative follows the life of George Demmerle, a factory worker whose political odyssey encapsulates the era's tumultuous spirit. From his roots as a concerned citizen wary of his country's leftward tilt, Demmerle's journey takes a dramatic turn as he delves into the heart of radical activism. Part...
For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.
None
This latest edition of the Newnes Data Communications Pocket Book has been substantially updated to keep abreast with the rapid pace of developments in data communications technology. New topics have been introduced - data compression, the Internet and World-Wide Web, HyperText Mark-up Language - existing material has been updated and expanded. Despite the complexity of subject, this wealth of information is presented succinctly and in such a way, using tables, diagrams and brief explanatory text, as to allow the user to locate information quickly and easily. Thus the book should be invaluable to those involved with the installation, commissioning and maintenance of data communications equipment, as well as the end user. Mike Tooley is the well known author of many books including the Newnes Computer Engineer's Pocket Book, now in its fourth edition.